a
b
c
Static task
static1
Behavioral task
behavioral1
Sample
0c1009fc0e62080cc63e8b0f900b56ea.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0c1009fc0e62080cc63e8b0f900b56ea.dll
Resource
win10v2004-20231215-en
Target
0c1009fc0e62080cc63e8b0f900b56ea
Size
19KB
MD5
0c1009fc0e62080cc63e8b0f900b56ea
SHA1
d932d3fdde161e73819681a16ffcc1106bf73db4
SHA256
72c7d65a583237d2de987785f04c718234d7d17d847d1978bb4a96f952a4c99e
SHA512
6df1bff4cac16c252ebebcce87fff7ee06aafe8098c348c1d7308e4a1125e66788169f1ee9e63d86b8cb465d70c919af1664de1f5440629190d4ab4918bbb7d6
SSDEEP
384:8uTr9N6RFiVbKad+dIKJa7mmZW/p9c8p3gBdFUOBv60:rKRFihKA+9a7BW9cOgBdyWS0
Checks for missing Authenticode signature.
resource |
---|
0c1009fc0e62080cc63e8b0f900b56ea |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadFile
lstrcatA
MultiByteToWideChar
GetProcAddress
GlobalFree
GetTempFileNameA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetTempPathA
lstrcpyA
CreateEventA
RtlUnwind
GlobalAlloc
WriteFile
GetProcessHeap
GetTickCount
HeapFree
HeapAlloc
lstrlenA
GetThreadLocale
GetSystemDefaultLCID
GetUserDefaultLCID
lstrcpynA
HeapReAlloc
SetFilePointer
lstrcmpA
CreateFileA
InterlockedExchange
GetLastError
VirtualQuery
SetDlgItemTextA
CallWindowProcA
EnableWindow
SetWindowTextA
IsWindowVisible
DestroyWindow
GetWindowRect
GetFocus
wsprintfA
GetClientRect
SendMessageA
RegisterWindowMessageA
SetWindowLongA
MessageBoxA
GetWindowLongA
GetForegroundWindow
GetKeyboardLayoutList
GetDlgItem
ShowWindow
CreateWindowExW
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegSetValueExA
HttpOpenRequestA
InternetSetFilePointer
FindCloseUrlCache
InternetOpenA
InternetCloseHandle
InternetConnectA
a
b
c
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ